To see the other types of publications on this topic, follow the link: SeChry.

Books on the topic 'SeChry'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'SeChry.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Baumgart, Rainer. Secure Networking — CQRE [Secure] ’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46701-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barker, Harold. Secure forever. Loizeaux Bros., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mahasweta, Debi. Sechha sainik. Nabapatra, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lange, James. Retire Secure! John Wiley & Sons, Ltd., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Samalin, Samuel. Secure UNIX. McGraw-Hill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hammad, Mohamed, Gauhar Ali, Mohammed A. El-Affendi, Yassine Maleh, and Ahmed A. Abd El-Latif. Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eberspächer, Jörg, ed. Sichere Daten, sichere Kommunikation / Secure Information, Secure Communication. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/978-3-642-85103-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wade, Edwards, ed. CCSP: Secure PIX and secure VPN study guide. SYBEX, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

), National Institute of Standards and Technology (U S. Secure hash standard. Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lam, Wai Wa Marco. Secure socket service. Oxford Brookes University, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Axworthy, Lloyd. The secure city. Vancouver Working Group, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

), National Institute of Standards and Technology (U S. Secure hash standard. Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Asplund, Mikael, and Simin Nadjm-Tehrani, eds. Secure IT Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70852-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ahmed, Mohiuddin, and Paul Haskell-Dowland. Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Tuveri, Nicola, Antonis Michalas, and Billy Bob Brumley, eds. Secure IT Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91625-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kumar, Vimal, Amartya Sen, and Sanjay Madria. Secure Sensor Cloud. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-031-01527-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jøsang, Audun, and Bengt Carlsson, eds. Secure IT Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34210-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15546-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gruschka, Nils, ed. Secure IT Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03638-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Yao, Jiewen, and Vincent Zimmer. Building Secure Firmware. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6106-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Paret, Dominique, and Jean-Paul Huon. Secure Connected Objects. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119426639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Brumley, Billy Bob, and Juha Röning, eds. Secure IT Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47560-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Buchegger, Sonja, and Mads Dam, eds. Secure IT Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Choo, Kim-Kwang Raymond. Secure Key Establishment. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-87969-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Perrig, Adrian, and J. D. Tygar. Secure Broadcast Communication. Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0229-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Gritzalis, Dimitris A., ed. Secure Electronic Voting. Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Askarov, Aslan, René Rydhof Hansen, and Willard Rafnsson, eds. Secure IT Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35055-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Riis Nielson, Hanne, and Dieter Gollmann, eds. Secure IT Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41488-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Preneel, Bart, ed. Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23556-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75248-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Reardon, Joel. Secure Data Deletion. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28778-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bernsmed, Karin, and Simone Fischer-Hübner, eds. Secure IT Systems. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11599-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85259-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32873-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04219-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11844662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Jonker, Willem, and Milan Petković, eds. Secure Data Management. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b99822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Jajodia, Sushil, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang, eds. Secure Cloud Computing. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9278-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lipmaa, Helger, Aikaterini Mitrokotsa, and Raimundas Matulevičius, eds. Secure IT Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70290-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Vitek, Jan, and Christian D. Jensen, eds. Secure Internet Programming. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kussin, Annette. Secure Parent, Secure Child. Guernica Editions, Incorporated, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sky, Mia. Secure. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

WAQAS, Muhammad. Secure. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bowlby, John. Secure Base. Taylor & Francis Group, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

santa, Jn. Staying Secure. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Drennan, Gerard. Secure Recovery. Willan, 2013. http://dx.doi.org/10.4324/9780203129173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bhargav, Abhay, and B. V. Kumar. Secure Java. CRC Press, 2010. http://dx.doi.org/10.1201/ebk1439823514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!